Zip Slip Vulnerability Affecting Thousands of Apps Puts Systems at Risk

Thousands of software projects and libraries contain code that extracts archives in an insecure way, allowing attackers to write arbitrary files outside the intended directories. In many cases, this can lead to remote code execution. The vulnerability… Continue reading Zip Slip Vulnerability Affecting Thousands of Apps Puts Systems at Risk

Is the traversal permission in a Unix filesystem exploitable by itself, in the absence of any other permissions/ACLs?

Scenario/question:

A unix directory tree has NTFv4 ACLs configured to allow an unprivileged account traversal on all dirs (but no other ACL granting further rights on any file/dir anywhere

In such a case, is it completely s… Continue reading Is the traversal permission in a Unix filesystem exploitable by itself, in the absence of any other permissions/ACLs?

Constructing file path from database table leading to vulnerability CWE 73: Directory Traversal

I have a table where the machine name, directory path and filenames are stored; when requested, I am supposed to return the content of the file by concatenating the machine_name + ‘\’ + directory_path + ‘\’ + filename but thi… Continue reading Constructing file path from database table leading to vulnerability CWE 73: Directory Traversal